Moonlock Lab and Annex Security have identified two new techniques used by crypto hackers in recent ClickFix attacks. The first involves impersonating venture capital firms like SolidBit, MegaBit, and Lumax Capital on LinkedIn to lure targets into fake Zoom or Google Meet pages. Victims are then tricked into executing malicious commands via a fake Cloudflare verification. The second method involves hijacking the Chrome extension QuickLens, which reportedly has around 7,000 users. After changing ownership, hackers push a malicious script version to initiate ClickFix attacks and steal wallet data and mnemonic phrases. ClickFix attacks have increased over the past year, exploiting the manual execution of malicious payloads to bypass traditional security measures.